First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8276 is classified as a high severity vulnerability due to the potential for Denial of Service (DoS).
To fix CVE-2019-8276, upgrade to UltraVNC revision 1212 or later, which contains the necessary patch.
CVE-2019-8276 affects UltraVNC versions prior to 1.2.2.3, along with specific Siemens Sinumerik versions.
CVE-2019-8276 is a stack buffer overflow vulnerability located in the VNC server's file transfer request handler.
Yes, CVE-2019-8276 can be exploited remotely due to its nature of being a network connectivity vulnerability.